"These attacks have been observed to be originating from a number of countries, including China," Deora said. "It has been observed that the attackers are compromising computer systems located in different parts of the world, and use masquerading techniques and hidden servers to hide the identity of actual systems from which the attacks are being launched."